BSD Magazine (December 2013) – CARP on FreeBSD

Configuring a Highly Available Service on FreeBSD – part 2: CARP and devd

In the first part of this series, we learned how to make high availability (HA) storage on FreeBSD using HAST. We learned how to control HAST and how to recover from failures. However, all those actions were still manual actions. In this second part of the series, Jeroen will teach how two basic building blocks, CARP and devd, work and how we can use them in the final part of our series to automate the failover of our NFS server.

FreeBSD Programming Primer – Part 11

In the penultimate part of our series on programming, Rob will look at using the Netbeans Integrated Development Environment to debug and edit our CMS.

Unix Basics – for Security Professionals

Unix is the widely known multi-user and multitasking operating system that exists in many variants (e.g. Solaris, Linux, UX, AIX …etc), and for serves mission critical server environments around the world. Ramkumar provides the basics of Unix Operating systems while discussing how UNIX addresses the above security challenges.

Introduction to Unix Kernel

It is usually a source of wonderment to PC users that the whole of the Unix operating system is in one executable. Instead of a hodge-podge of DLL’s, drivers, and various occasionally-cooperating executables, everything is done by the Unix kernel. When Unix was first introduced, the operating system was described as having a ‘shell’, or user interface, which surrounded a ‘kernel’ which interpreted the commands passed to it from the shell.

OpenBSD 5.4 as a Transparent HTTP/HTTPS Proxy

Wesley in his article will teach you how to configure Relayd for URL Blocking with https inspection and how to use and understand Packet Filter.

GhostBSD: A User-friendly, Lightweight BSD Alternative

GhostBSD is an open source desktop operating system based on FreeBSD which aims for a secure, user-friendly experience out of the box. GhostBSD comes with most common software choices already configured, giving the user a solid BSD installation out of the box. Adrian will tell you why he chose FreeBSD OS.

How Secure Can Secure Shell (SSH) Be?

To begin, let’s concentrate on the One Time Password (OTP). We are going to achieve our already secure SSH in conjunction with OTP for remote system connections. At first, in algorithmic meaning, OTP is a character string which should never repeat. Arkadiusz, in his article, demonstrates configurations as well as tricks that make using the protocol more secure.

Column by Rob Somerville

OPINION: With the UK government in collusion with the major search engines to censor 100,000 search terms to prevent child abuse, is the UK joining the ranks of the technological fascists?